Defused
@DefusedCyber
Followers
3K
Following
607
Media
155
Statuses
363
Real-Time Threat Intelligence via Cyber Deception. Start Building for Free: https://t.co/TTnxgi9Hv5
Joined August 2023
β οΈActor mass exploiting unknown Fortinet exploit (FortiWeb path traversal / API exploitation) from 107.152.41.19 πΊπΈ ( TZULO ) VirusTotal Detections 0/95 π’ After the exploit, the actor attempted to login using the newly created username-credential pair π
2
14
53
β Multiple IPs mass exploiting unknown Fortinet exploit (FortiWeb path traversal / API exploitation) The exploit aims at creating a user with the user-password combination Testpoint:AFT3$tH4ckmet0d4yaga!n π IPs involved in this exploit: 185.192.70.39 185.192.70.55
0
3
6
Some heightened activity on WSUS / CVE-2025-59287 during the last few days, put one of the payloads into a gist if someone is interested: https://t.co/ttzcTuh9V4
0
9
16
Patching Motivation of the Day π Actor repeatedly hammering the CVE-2025-25257 exploit onto our Fortiweb honeypots with a DROP TABLE payload 213.209.143.41 just wants to watch the world burn! π₯
0
4
21
Ransomware vulns with highest exploit likelihood β¬οΈ (past 30d): - CVE-2025-61882 (Oracle E-Busine..) +186086.05% - CVE-2021-27877 (Veritas Veritas..) +879.54% - CVE-2023-20269 (ASA..) +302.13% - CVE-2023-20269 (FTD..) +302.13% - CVE-2025-29824 (CLFS..) +289.16%
1
16
66
Weekend of the F5 exploits... seeing like a 5-10x rate of exploitation to normal in the past 24 hrs Some actor is spraying known exploits like crazy (even old ones like CVE-2020-5902) @GreyNoiseIO has an interesting wpaper about how exploit spikes can predict new CVEs π
1
9
32
π¨Major exploit sweep targetting F5 BIG-IP ongoing A set of 10 IP addresses exploited CVE-2022-1388 on multiple of our F5 honeypots within the span of an hour F5 was recently breached, with breached data including previously unknown software vulnerabilities. Large-scale
0
19
52
Actor exploiting CVE-2023-27997 (Fortinet buffer overflow) from 170.247.220.25 πΊπΈ ( My Tech ) VirusTotal Detections: 0/95 π’ This actor was recently mass probing Palo Alto devices for authentication pathways π―
0
4
25
π Going live in 30 minutes! Atomics on a Friday: Night of the Living Indicators - join us for live emulations, haunted artifacts, and MCP mayhem. See you thereβ¦ or on the recording. π»βοΈ Twitch: https://t.co/54yXPSVO42 X Linkedin YT:
0
4
7
A couple more days to deploy a FortiWeb decoy / honeypot for FREE π https://t.co/GXFaqghsXI New tiers launching next week π―
0
1
3
Actor exploiting CVE-2025-25257 (FortiWeb SQLi) from 172.96.141.66 πΊπΈ (RELIABLESITE) VT Detections: 0/95 π’ Payload in Authorization: Bearer header πΈ select/**/a/**/from/**/fabric_user.a/**/into/**/outfile/**/var/log/lib/python3.10/pylab.py'/**/FIELDS/**/ESCAPED/**/BY/**/
1
6
20
Baddies using infra hosted in the USA to attack CISCO ASAs! (thanks @DefusedCyber and @ipinfo )
A large scale sweep targetting Palo Alto (/global-protect/prelogin.esp & /ssl-vpn/prelogin.esp) This is recon activity used in MFA bypass attempts if I'm not mistaken. 170.247.220.25 143.137.166.65 170.247.222.234 170.231.251.212 All clean IPs from VT / GN
2
1
25
A large scale sweep targetting Palo Alto (/global-protect/prelogin.esp & /ssl-vpn/prelogin.esp) This is recon activity used in MFA bypass attempts if I'm not mistaken. 170.247.220.25 143.137.166.65 170.247.222.234 170.231.251.212 All clean IPs from VT / GN
1
12
46
Other activity from the same actor
Actor exploiting multiple F5 BIG-IP vulnerabilities from 208.123.119.118 πΊπΈ ( SHOCK-1 ) VirusTotal Detections 0/95 π’ The actor exploited CVE-2022-1388, CVE-2023-46747 and attempted to afterwards access F5 Local Traffic Management (LTM) components π¨
0
0
2
How attackers rapidly switch IP addresses during exploits π This attacker exploits CVE-2023-46747 to add an admin account to a F5 BIG-IP honeypot, and immediately logs on from a different IP address using the new credentials 185.167.60.154 π«π· ( LIMESTONENETWORKS ) VT 0/95 π’
1
4
13
Dataset of 81k Cisco exploit (login bruteforce / CVE-2022-20759) attempts from past 7 days IPS associated: https://t.co/huedR0zZWG Username-pass combos:
gist.github.com
Cisco Honeypot Bruteforce IPs 21-28 Oct 2025 . GitHub Gist: instantly share code, notes, and snippets.
0
8
32
Actor exploiting multiple Fortinet Fortiweb honeypots from 185.253.163.82 πΊπΈ( M247 Europe SRL ) VirusTotal Detections 0/95 π’ The actor exploited CVE-2025-25257 on multiple Fortiweb honeypots, plus attempted logging in as administrator
0
2
10
Tune in on Friday to @AtomicsonaFri for some Defused fun! π―
π This Friday... something wicked logs in. Weβre teaming up with the brilliant minds at @DefusedCyber for our Halloween special π Weβll resurrect real-world threats, view them live, and hunt their artifacts. https://t.co/B3kuKvoMyF
0
0
4